Analysis

  • max time kernel
    164s
  • max time network
    174s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-12-2023 08:58

General

  • Target

    7f67b26c635927694f0397efc717ec08.exe

  • Size

    12KB

  • MD5

    7f67b26c635927694f0397efc717ec08

  • SHA1

    bcac3ee4a545db4d2bcf7deee4e3c93222bc0750

  • SHA256

    fbcbbe7c79dfdac4586e2f20393384f03764c6555d357698476ffa5c4e1d9e80

  • SHA512

    1f056abb0a8630fad17a212da29f71d9a5f1ca9d8482510fc588ada32c471c97154ed5fd509fd788107bca3c64b2380ab797d1f73bd932eacf805e22e4e7e3c2

  • SSDEEP

    384:6K+dKfzQHxFxRmyja4QhiP7UlY/pjKhYsKUAylUmtsYQ:v+dAURFxna4QAPQlYghxKUAyl9tTQ

Score
10/10

Malware Config

Signatures

  • Upatre

    Upatre is a generic malware downloader.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7f67b26c635927694f0397efc717ec08.exe
    "C:\Users\Admin\AppData\Local\Temp\7f67b26c635927694f0397efc717ec08.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2492
    • C:\Users\Admin\AppData\Local\Temp\szgfw.exe
      "C:\Users\Admin\AppData\Local\Temp\szgfw.exe"
      2⤵
      • Executes dropped EXE
      PID:4632

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\szgfw.exe

    Filesize

    12KB

    MD5

    0c29f542405a0ddb335dde2aa70408e9

    SHA1

    45834983e263635f4d974bb5bb2b5437262e123a

    SHA256

    20b7fcd81f91ad0b13684cb4aba8a57e057d5fcd2dfe1d21825032845fc2feb9

    SHA512

    71a8151f6559d8d665f8482d3acf672c061a7a80cb17e2f110c48f38db0c7855c2b9459a165fa7cb3a83ab2c0fffe102bf105a154d60367dc0853c56a5ed9a78